SU24 must be set up before implementing any roles.
A. True
B. False
Answer Posted / himmatchavan
TRUE....
Do you any explanation ?
| Is This Answer Correct ? | 3 Yes | 0 No |
Post New Answer View All Answers
Differentiate between usobx_c and usobt_c
How would you do the 'a user logge into production system, changes a table and logged out'. How would you track him?
how we Restrict the auth groups for table maintain, creating Auth group using SE54 to built new Auth groups to restrict tables via auth object S_TABU_DIS
can you please send me SAP Security upgrade documents and guide for CRM 5 and CRM 7 and what are the differeces between crm 5 AND crm 7 according to sap security point of view.
how you can delete multiple roles from qa, dev and production system?
What are the steps involved in SAP Security upgradation projects and also in SAP security impletation projects
Giving fire call access and extending fire call access by using VIRSA’s VFAT tool? can u brief give the explanation
what is the main difference between the derived role and a single role?
What is the difference between role and a profile?
the company needs to expand its region to another country which the same authorizations had previously what approach you will take
what is user base in sap security?
what is analysis authorization in sap bi and how to create analysis authorization in sap bi?
Attributes in SE01?
what is use of copy data in derived role and when we use this one ???
Authorization check on s_btch_job failed. What would happen now?